Computer Networks » Security Management
Security management is both a/an _______ and a/an _______ issue in information management.
A. Technical, administrative
B. Authoritative, non-administrative
C. Non-technical, administrative
D. Non-authoritative, administrative
Read more about this MCQ
Firewalls use _________ as the primary technique of controlling undesired traffic.
A. Performance management
B. Cryptography
C. Packet filtering
D. Masquerading
Read more about this MCQ
Which among the following algorithms implement secret key?
A. . des is designed for efficient hardware implementation and consequently has a poor performance if implemented in software. in contrast to that, idea functions efficiently in software implementation. advertisement
B. Des
C. Rsa
D. Crc
Read more about this MCQ
What do you mean by integrity protection in Security management?
A. It makes sure that the information has not tampered as it traverses between the source and the destination
B. It validates the originator identification
C. It is used to overcome some of the problems identified in packet filtering
D. It reduces the risk of access to hosts from an external network by filtering insecure services
Read more about this MCQ